Results 121 to 130 of about 72,170 (255)

CoINS‐Parking: Compressed IoT Blockchain Network Smart Parking

open access: yesIET Blockchain
In this paper, CoINS‐Parking, a compressed IoT blockchain network for smart parking systems, is presented. Smart parking collects data and processes it to provide real‐time information about parking availability.
Danial Fazelpour, Athena Abdi
doaj   +1 more source

Sex‐ and skeletal muscle‐specific gene expression response of histone 3 lysine 27‐modifying enzymes by voluntary running in mice

open access: yesPhysiological Reports, Volume 14, Issue 7, April 2026.
Abstract Skeletal muscle is highly plastic and capable of remodeling its contractile and metabolic properties depending on physical demands. Such remodeling requires modification of chromatin structure to support transcriptional activation and repression of gene programs. Chromatin dynamics depend, in part, on the acetylation and methylation of histone
Daniel Gamu   +5 more
wiley   +1 more source

Secure resource metering and accounting with hash chain in cloud storage

open access: yesTongxin xuebao, 2013
Cloud storage is a pay-per-use service of which the billing plan is typically based on users' resource consump-tion metered by server side. Therefore, the trustworthiness between payer and service provider becomes a key factor for the business, and ...
Mei LIU   +5 more
doaj  

A Study on zk-SNARK-Based RBAC Scheme in a Cross-Domain Cloud Environment

open access: yesApplied Sciences
Because of the advancement of IT, cross-domain environments have emerged where independent clouds with different security policies share data. However, sharing data between clouds with heterogeneous security levels is a challenging task, and most ...
Seong Cheol Yoon   +3 more
doaj   +1 more source

Validator selection using pre-committed hash chains

open access: yes, 2019
Validators pre-commit hash chains of length w. When creating a block, validators commit the pre-image to the current hash in their hash chain, and combines it with the random number Selector, hash(x) ⊕ Selector. This random number selects the next validator.
openaire   +1 more source

Hash chaining degrades security at Facebook

open access: yes
Modern web and digital application password storage relies on password hashing for storage and security. Ad-hoc upgrade of password storage to keep up with hash algorithm norms may be used to save costs but can introduce unforeseen vulnerabilities. This is the case in the password storage scheme used by Meta Platforms which services several billion ...
openaire   +2 more sources

Analysis of cross-chain technology of blockchain

open access: yes物联网学报, 2020
With the development of blockchain technology,more and more blockchain projects have appeared.Due to the closure property of the blockchain,different blockchains have become islands of value.The information interaction and value transfer problems between
Zhao GUO   +4 more
doaj  

A Novel Approach for Block Chain Technology based Cyber Security in Cloud Storage Using Hash Function

open access: hybrid, 2023
C. Kanmani Pappa   +5 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy